Case study – identifying the attacker